Which operating system is used by most the supercomputer system in the world

Answers

Answer 1

Answer:

Linux

Explanation:

Linux runs all of the top 500 supercomputers


Related Questions

You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")

can you identify one syntax error and one logic error in these lines? why do you think a programmer might have made the logic error?

Answers

Answer:

There is no indentation on the second line -  Python needs indentation for if statements to work

The if statement is incorrect - We want the if statement to check if a is greater than 10 not less than 10

A programmer might have made this error by confusing the less than and greater than signs

(I'm assuming this is python)

Which draws a line while moving the pen 30 steps to the right?
from turtle import*
o drawright(30)
o move(30)
oright(30)
o forward(30)

Answers

Answer:

forward(30)

Explanation:

the turtle.forward command will move the turtle to the right

Choose the missing term.

___ time

time.sleep(3)

1.form
2.insert
3.import

Answers

Answer:

import

Explanation:

the import keyword is used to import external modules into a python script.

Mark this question for review To answer this question, complete the lab using information below. Launch Lab You are setting up on a small network. The owner of the network has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while maintaining security for the Home-PC and Home-PC2 computers. In this lab, your task is to complete the following: Use the appropriate network components to connect the two computers to the new ISP. • Place the Ethernet router with firewall capabilities on the Workspace. • Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports. Use the AC to DC power adapter to plug in the device. • Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet. In this lab, the networking devices are preconfigured with the correct settings to make the connection to the internet service provider (ISP) and the internet.

Answers

The appropriate network components steps to take to connect the two computers to the new ISP is given below.

What is the network components  about?

In carryout the above task, the first thing to do is click the Shelf, and widen the Networking Devices.

Other steps are:

Take the Ethernet router and firewall to the Workspace.Beyond the router, Click on Back to switch and change to the back view.Beyond the switch, Click on Back to switch to change to back view of the switch.Beyond the cable modem, change by clicking on Back to switch to the back view as seen on the cable modem.

Later on click  on the Ethernet cable as found on the third switch port and then extend it to an open Ethernet LAN port on the router to link up the Home-PC down to the router.

Click also on the Ethernet cable as seen the third switch port and then take it also  to an open Ethernet LAN port as seen on the router to link up the second Home-PC to the router.

Then also click on the last Ethernet cable on the switch and extend (drag) it to the open Ethernet WAN port as seen on the router to link up the router to the internet service.

Then click the Ethernet cable on the cable modem and extend it to a single of the RJ45 ports that can be found by going to the wall plate.

Make sure to select the DC power connector that can be seen on the switch and extend it to the power port seen on the router so that one can plug in the router.

Looking at the Home-PC, select to view Windows 10 to see if the system is properly linked to the network and also the internet.

Go to the notification aspect and the select the Network icon and click on the tool called Open Network and Sharing Center.

Lastly, One can know if the connection to Home-PC2 is working by clicking on bench as seen in the top menu, and then select to see Windows 10 to know if it is well linked to the network and internet and also follow the notification steps above.

Learn more about  network components from

https://brainly.com/question/20535662

#SPJ4

You can click the tabs at the bottom of a workbook to switch between.

Answers

Notes or screens? I think

what special problems can occur with wireless networks

Answers

Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity. Piggybacking, if you fail to secure your wireless network, anyone with a wireless-enabled computer in range of your access point can use your connection. Network congestion, Routers or other network equipment are overloaded with too much traffic. Speed Mismatch. This occurs when multiple users try to make use of the same server. I could go on and on.

Hope this helps!
Please give Brainliest!

Explain why the connection times out despite adding the 'permit' statement for the End_User network to the ACL.

Answers

The connection timed out despite adding the 'permit' statement for the End_User network to the ACL because permission to be granted access was denied.

What is ACL?

ACL is an acronym for access control list which is the list of permissions that are related to the computer system network.

When an End-User is denied access to a network even after obtaining a permit statement, is could be that the End-User system has not been added to the list.

Learn more about network here:

https://brainly.com/question/26956118

True or False: An Intrusion Detection System (IDS) is generally a passive device that listens to network traffic and alerts an administrator when a potential problem is detected

Answers

Answer:

According to your question, I think it is true.

Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia

Answers

The type of computer application which apple keynote is, is: c. presentation.

What is a presentation application?

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that comprises both textual and multimedia information, which are typically used during a presentation.

This ultimately implies that, apple keynote is an example of a presentation application which is used on computers.

Read more on presentation application here: https://brainly.com/question/26404012

#SPJ4

what is UTP in terms of network​

Answers

Answer: Unshielded bent match (UTP) could be a omnipresent sort of copper cabling utilized in phone wiring and neighborhood region systems (LANs). There are five sorts of UTP cables recognized with the prefix CAT, as in category each supporting a distinctive sum of transfer speed.

Explanation:

Marie uses a CSS file to style the elements in her HTML document. What is the advantage of using an external CSS file to style HTML elements

Answers

The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

What is HTML element?

An HTML element is known to be an element that is said to be often defined by a start tag, its content, and an end tag.

Therefore, The advantage of using an external CSS file to style HTML elements is that  It is easier to add functionality to HTML elements.

Learn more about  HTML elements from

https://brainly.com/question/11569274

#SPJ1

Describe the ideal environment for a computer to work properly

Answers

The ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

What is a computer?

Computer is an electronic device, that perform various of tasks easily that take humans much time.

It is a machine on which we can work and contains a screen and operators, like keyboard and mouse.

Thus, the ideal environment for a computer to work properly is a cool place to avoid heating of the computer, good air circulation in the place so that the computer's fan can get cool air.

Learn more about computer

https://brainly.com/question/21080395

#SPJ1

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have

Answers

Based on the above scenario,  the type of network that you have is known as the  peer to peer network.

What is  peer-to-peer network?

In this network, all the host can give network resources to other hosts or a form of access to  resources located on other hosts, and each host is said to often be in charge of controlling access to all these resources.

Note that Polling is a media access way where one device gives permission to other devices to access the network and as such, Based on the above scenario,  the type of network that you have is known as the  peer to peer network.

Learn more about peer to peer network from

https://brainly.com/question/10571780

#SPJ1

Because of the Patriot Act of 2001, law enforcement officials:

OA. can access your email
activity more easily.

OB. must periodically check your online activity.

OC. are not authorized to monitor your emails.

OD. need permission to view your text messages.

Answers

Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity.

What is the role of Patriot Act ?

The USA Patriot Act is known to be an Act that hinders and punishes terrorist attacks that is done in any part of the United States and abroad via enhanced law enforcement and others.

Therefore, Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity to see if there is threat to national security.

Learn more about Patriot Act from

https://brainly.com/question/25741451

#SPJ1

Answer:

A, can access your email activity more easily

Explanation:

Trust me its correct

Who completes the action item form in a team meeting

Time keeper
Scribe
Recorder
Team leader
Gate keeper

Answers

Answer:

Recorder

Hope this helped! I'm not 100% if this answer is correct, though

Recorder completes the action item form in a team meeting. Thus, option C is correct.

Who is a Team Leader?

Team Leader refers to a person that is in charge of a group of people and helps them to achieve a common goal. Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

A team leader can be found in the army as a General, in business industries, and even a president can be referred to as a team leader.The Gate Keeper is typically a role that is assigned to a person who is responsible for ensuring that the meeting runs smoothly and productively.

The Gate Keeper's primary responsibility is to manage the flow of information and ensure that all participants have an opportunity to contribute and that the meeting stays on track.

Therefore, Recorder completes the action item form in a team meeting. Thus, option C is correct.

Learn more about Recorder on:

https://brainly.com/question/31388398

#SPJ2

Why do small amounts of impurities have such a large effect in doping semiconductors?

Answers

Answer Because the band gap is so small for semiconductors, doping with small amounts of impurities can dramatically increase the conductivity of the material

To ensure you don't forget your password, you should use one unique and safe password for all your accounts. a) True b) False

Answers

The answer is False you shouldn’t do that!

pivottable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or explore trends.

What is pivot table?

This is known to be a summary of one's data, that can be shown in a chart that gives one room to report on and look at trends based on one's information.

Note that It often shows the value of one item that is the Base Field and also the percentage of other item known to be the Base Item.

Learn more about from

https://brainly.com/question/2222360

#SPJ1

How do you access a sample credit report and credit score? Once you have your credit report
and credit score, how do you go about interpreting them? What components are included in a
credit report?

Answers

Answer:

only good knows the answer son

Explanation:

can I have some help?

Answers

Answer: String

Explanation: A int would be the for a number. A string is for word(s). Hope this helped!

Answer:

A is correct, it is widely used, and it also sounds good.

Explanation:

Strings are connected, such as coding and bricks. For example "A string of events." String is widely used in lots of subjects, including coding. It is also easy to spot.

A____
interprets an audio or video signal and compresses it.
Codec
Frequency
Bit rate
RGB

Answers

Answer:

Codec

Explanation:

A codec (encoder/decoder) is a piece of hardware or software that interprets an audio or video signal and compresses it.

HOPE THIS HELPS AND HAVE A NICE DAY <3

________ speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

Answers

↓Answer↓

In-database analytics speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

how many questions are on the ap computer science principles test

Answers

Answer:
70.

Explanation:
The 2021 AP Computer Science Principles Exam is 2 hours long and includes approximately 70 multiple-choice questions. There will be three types of questions: Single-select questions (57 questions).

Hope this help’s!
Please give Brainliest!

A spreadsheet program allows a user to _______. a. perform complicated calculations automatically b. deliver elegant presentation to a large audience easily c. organize, send, and retrieve e-mails quickly d. keep viruses from infecting their computers please select the best answer from the choices provided a b c d

Answers

Answer:

c

Explanation:

Please create a new java package and class file for each problem. 1. Given the current array of numbers - [0,2,85,71,44,6,8,54,5,21], find the largest and smallest value in the unsorted array. 2. Given the current array of integers - [235,21,5,6,21,22,5,6,1,2,3], check if the array contains either 3 or 6. 3. Create an array which contains 20 integer values. Assign a ramdom value for each array element using a for loop . Find all duplicate interger values in an array

Answers

Answer:

¿Cómo se crear un objeto de una determinada clase en Java?

Para crear un objeto de una clase se usa la palabra reservada new. Por ejemplo, Rectangulo rect1=new Rectangulo(10, 20, 40, 80); new reserva espacio en memoria para los miembros dato y devuelve una referencia que se guarda en la variable rect1 del tipo Rectangulo que denominamos ahora objeto.

Explanation:

¿Cómo pasar un objeto de una clase a otra en Java?

Para clasificar un método de otra clase, necesitamos tener el objeto de esa clase. Aquí, tenemos una clase “Student” que tiene un método getName() . Accedemos a este método desde la segunda clase SimpleTesting usando el objeto de la clase Student

A student made a model of isostasy by placing a block of wood in a beaker of water. what does the wooden block represent in the model?

a. a glacier
b. earth's crust
c. sea level
d. earth's mantle

Answers

The answer is B., Earth’s crust :)

Answer:

D) Earth's mantle

Explanation:

what ctrl to show the font dialog box​

Answers

Answer:

Ctrl + D key  [Same time]

Explanation:

Using this imput will allow you to see the font dialog box :D

Have a great day <3

Describe the shorthand representation of the structure of a relational database. Why is it important to be able to represent the structure of a database in a shorthand fashion

Answers

The  shorthand representation is used to depict the database table in an easier way or manner.

What is the shorthand representation?

A symbol is known to be a kind of shorthand representation for the object of a specific structure.

Note that the shorthand representation is used to depict the database table in an easier way or manner. as one can be able to do things easily because there is a short cut.

It is known to tell or address the Database table in a simple and reasonable way with ease of utilization.

Learn more about Database from

https://brainly.com/question/26096799

#SPJ1

You will participate in a Discussion Board with your peers to express your ideas on the unit topics. In this Discussion Board, prepare a post based on the following.

After reviewing your work for Unique Physique, the owner would like your input regarding the future of the company. In two or more paragraphs, provide your thoughts on the trends and forecasts possibilities for the gym. Also, discuss the benefits of producing the flyer for the business, what affects the presentation will have on the business, and which products can be expanded to increase profits.

Respond thoughtfully, then comment on some of the entries of your classmates. Be respectful to others. Refer to the Discussion Rubric for guidance.

Answers

The current trends and forecasts possibilities for the gym are:

Home exercise gym. .Strength training that is made up of free weights.Personal Training, etc.

What is the future of fitness?

Exercise, health and wellness  is one that is often been transformed and as such, gyms providers of fitness need to upgrade themselves both inside and outside their walls and thus make a change that can reach new customers.

Note therefore,  The current trends and forecasts possibilities for the gym are:

Home exercise gym. .Strength training that is made up of free weights.Personal Training, etc.

Learn more about gym from

https://brainly.com/question/1365564

#SPJ1

The concept of pirate radio led to the use of an online tool in which:

OA. music can be streamed or experienced online the instant it is captured.
B. musicians can adjust notes that are out of tune to make them sound better.

OC. artists can share news and concert dates with their current and future fans.

OD. friends can share audio or video files with other people on the Internet.

Answers

The concept of pirate radio led to the use of an online tool in which: A. music can be streamed or experienced online the instant it is captured.

What is a pirate radio?

Pirate radio can be defined as an illegal and unlicensed radio broadcast station that receives unauthorized communication signals across borders. Also, the transmission technique, mode, and power used by pirate radio were unauthorized.

Consequently, the concept of pirate radio led to the use of an online tool called "live streaming" in which music can be streamed or experienced online the instant it is captured.

Read more on pirate radio here: https://brainly.com/question/16724264

#SPJ1

Other Questions
match each word with the phrase that best defines it Which portion of The United states is at a high risk for hurricanes?O Great lakesO Desert southwestO West coastEast Coast PLEASE HELP!!!Solve for x using the Quadratic Formula: x2 + 2x + 1 = 0-b+Vb2-4acX=2aOx=2Ox= 1O x = 0O x = -1 A client whose condition remains stable after a myocardial infarction is to gradually increase activity. Which sign best indicates that the activity is appropriate for the client Who was the soldier that was destroyed in the bomb blast in the introductory story? What was the silver lining the commander noted? 6 erasers cost $6.60.Which equation would help determine the cost of 3erasers? During the 1980 election, what question didRonald Reagan ask American voters?A. "Do you like Jimmy Carter?"B. "Are you a communist?"C. "Are you in favor of nuclear power?"D. "Are you better off than four years ago?" what set of data corresponds to the dot plot Change the verb in brackets to correct verbsthe director of the company ______ in his office (be) Turn to passive. (ASAP)1. We can conduct the cross country race this year.2. Our manager is making a podium for the club.3. The committee members will hand over the gift vouchers. What is the correct spelling of the underlined word? Spell check indicates which words you have mispelled by underlining them in red.A. misspelledB. It is correct as is.C. misspeledD. misspelleed Why did the speaker decline to grant product endorsements to marketers after her study was published? Which of the following is an example of in-group bias? A. Avery, who loves to go to car shows B. Shelly, who thinks her cheerleading team is better than any other school's team C. Zoe, who likes to shop more than anything else D. Matt, who loves to watch his favorite team play football Explain how friction is involved in energy transformation. somebody please help me with this A photon has an energy of 2.88 x 10^-18 j. convert this energy into ev. alguien que sea de Per? 5.-help please math geniuses pls help!!!pls check other questions too! I need help with this please The length of a rectangle is three times the width. The sum of the length and the width is 24 inches. What is the length of the rectangle?